Step-by-Step

Azure AI Speech launches new zero-shot TTS models for Personal Voice

At the Ignite conference on Nov 15, 2023, we announced the public preview of Personal Voice, which is specifically designed to enable customers to build apps that allow their users to easily create and use their own AI voices (see the blog). Today we’re thrilled to announce that Azure AI Speech Service has upgraded its […]

Azure AI Speech launches new zero-shot TTS models for Personal Voice Continue Reading

Best practices in moving to cloud native endpoint management

This blog is the second of three that details our recommendation to adopt cloud native device management. In the first post, we shared three stories explaining why large organizations moved to a cloud-native management stance. A common thread through the customer stories was how they achieved greater security, cost savings, and readiness for the future

Best practices in moving to cloud native endpoint management Continue Reading

Enable GPT failover with Azure OpenAI and Azure API Management

The year is 2024.  It is 2pm in New York City on a cold and gloomy Monday. The CTO of a Wall Street hedge fund is reviewing the go-live plan for her new GenAI application. It will allow the firm’s analysts to produce reports in a fraction of the time. At the same time in

Enable GPT failover with Azure OpenAI and Azure API Management Continue Reading

The AI Study Guide: Azure’s top free resources for learning generative AI in 2024

Hi! It’s me, Natalie, your Azure AI learning guru. Want to learn something about Azure AI? We’ve got something for that! Welcome to the January edition of the Azure AI Study Guide. Every month I’ll bring you the best and newest tools when it comes to skilling up on Azure AI. This month, we’re all

The AI Study Guide: Azure’s top free resources for learning generative AI in 2024 Continue Reading

Unified security operations with Microsoft Sentinel and Microsoft Defender XDR

Numerous cybersecurity tools exist to help organizations protect their data, people, and systems. There are different tools that check emails for phishing attempts, secure infrastructure and cloud, and provide generative AI to detect threats and uplevel response beyond human ability. While each of these tools is valuable on its own, each just tells one part

Unified security operations with Microsoft Sentinel and Microsoft Defender XDR Continue Reading

Empower Azure Video Indexer Insights with your own models

Overview  Azure Video Indexer (AVI) offers a comprehensive suite of models that extract diverse insights from the audio, transcript, and visuals of videos. Recognizing the boundless potential of AI models and the unique requirements of different domains, AVI now enables integration of custom models. This enhances video analysis, providing a seamless experience both in the

Empower Azure Video Indexer Insights with your own models Continue Reading

Uncover the Future: Microsoft Autonomous AI Agents analyzing SAP Data Insights

As a professional in SAP, Data and AI, intimately involved with the latest developments in Microsoft Research, our focus has been keenly set on the advancements in Generative AI (GenAI) and Large Language Models (LLMs) such as GPT, Claude, Palm, and Llama. These groundbreaking technologies represent more than mere progress in natural language processing; They

Uncover the Future: Microsoft Autonomous AI Agents analyzing SAP Data Insights Continue Reading

Combine Semantic Kernel with Azure Machine Learning prompt flow

Context With the rapid advent of generative AI and the multiplication of use cases came the inevitable battle of the tools for world domination. Aligning with their mission to empower every person, Microsoft has built a suite of tools with various levels of abstraction and control so that the applied data scientist, the casual hobbyist,

Combine Semantic Kernel with Azure Machine Learning prompt flow Continue Reading

Protecting credentials against social engineering: Cyberattack Series

Our story begins with a customer whose help desk unwittingly assisted a threat actor posing as a credentialed employee. In this fourth report in our ongoing Cyberattack Series, we look at the steps taken to discover, understand, and respond to a credential phishing and smishing (text-based phishing) cyberattack that targeted a legitimate, highly-privileged user with

Protecting credentials against social engineering: Cyberattack Series Continue Reading

Step-by-Step : Assign access packages automatically based on user properties in Microsoft Entra ID

Microsoft Entra ID Governance offers the capability to manage the access lifecycle of resources through access packages, which are organized into catalogs and define the resources available within them. Each access package includes at least one policy that outlines who can request access to it, the approval process, and access lifecycle settings such as assignment

Step-by-Step : Assign access packages automatically based on user properties in Microsoft Entra ID Continue Reading